Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Security Architecture

Last Chance to Register for the 2014 ICS Cyber Security Conference

2014 ICS Cyber Security Conference Discount Code

2014 ICS Cyber Security Conference Discount Code

On Monday, attendees from around the world will gather for the 2014 ICS Cyber Security Conference in Atlanta, Georgia. Over four days, hundreds of people will benefit from the robust exchange of technical information, actual incidents, insights and best practices to help protect critical infrastructures from cyber attacks.

Attendees can still register online and pay just $1895 for a full conference registration which includes 4 days INCLUDING workshops on Monday. Registration will close shortly.

ICS Cyber Security SponsorsSince 2002, the ICS Cyber Security Conference has gathered ICS cyber security stakeholders across various industries and attracts operations and control engineers, IT, government, vendors and academics.

As the longest-running cyber security-focused conference for the industrial control systems sector, the event will cater to the energy, utility, chemical, transportation, manufacturing, and other industrial and critical infrastructure organizations.

The conference will address the myriad cyber threats facing operators of ICS around the world, and will address topics covering ICSs, including protection for SCADA systems, plant control systems, engineering workstations, substation equipment, programmable logic controllers (PLCs), and other field control system devices.

The 14th ICS Cyber Security Conference will have 5 major themes:

• Actual ICS cyber incidents

• ICS cyber security standards

• ICS cyber security solutions

Advertisement. Scroll to continue reading.

• ICS cyber security demonstrations

• ICS policy issues

The majority of conference attendees are control systems users, working as control engineers, in operations management or in IT. Industries represented include defense, power generation, transmission and distribution, water utilities, chemicals, oil and gas, pipelines, data centers, medical devices, and more. Other attendees work for control systems vendors, security products and services companies, associations, universities and various branches of the US and foreign governments.

http://www.icscybersecurityconference.com/#!register/c8g7

Representatives from these organizations and many more have attended the ICS Cyber Security conference in the past:

ICS Conference Attendees

Confirm Your Spot and Register Today!

About the Conference

The ICS Cyber Security Conference is the conference where ICS users, ICS vendors, system security providers and government representatives meet to discuss the latest cyber-incidents, analyze their causes and cooperate on solutions. Since its first edition in 2002, the conference has attracted a continually rising interest as both the stakes of critical infrastructure protection and the distinctiveness of securing ICSs become increasingly apparent.

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Artificial Intelligence

ChatGPT is increasingly integrated into cybersecurity products and services as the industry is testing its capabilities and limitations.

Compliance

Government agencies in the United States have made progress in the implementation of the DMARC standard in response to a Department of Homeland Security...

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Artificial Intelligence

Microsoft and Mitre release Arsenal plugin to help cybersecurity professionals emulate attacks on machine learning (ML) systems.

Endpoint Security

Apple has launched a new security research blog and website, which will also be the new home of the company’s bug bounty program.

Management & Strategy

Hundreds of companies are showcasing their products and services this week at the 2023 edition of the RSA Conference in San Francisco.